Keycloak Denial of Service (DoS) Vulnerability via JWT Token Cache
Moderate severity
GitHub Reviewed
Published
Mar 25, 2025
to the GitHub Advisory Database
•
Updated Apr 30, 2025
Description
Published by the National Vulnerability Database
Mar 25, 2025
Published to the GitHub Advisory Database
Mar 25, 2025
Reviewed
Mar 25, 2025
Last updated
Apr 30, 2025
A flaw was found in Keycloak. When the configuration uses JWT tokens for authentication, the tokens are cached until expiration. If a client uses JWT tokens with an excessively long expiration time, for example, 24 or 48 hours, the cache can grow indefinitely, leading to an OutOfMemoryError. This issue could result in a denial of service condition, preventing legitimate users from accessing the system.
References